Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv...
详细信息
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspective of evolution and succession, including an evolution stage with Low-resolution Location Model (LrLM) and a succession stage with High-resolution Refinement Model (HrRM). The evolution stage achieves detail-preserving salient objects localization on the low-resolution image through the evolution mechanisms on supervision and feature;the succession stage utilizes the shallow high-resolution features to complement and enhance the features inherited from the first stage in a lightweight manner and generate the final high-resolution saliency prediction. Besides, a new metric named Boundary-Detail-aware Mean Absolute Error (MAEBD) is designed to evaluate the ability to detect details in high-resolution scenes. Extensive experiments on five datasets demonstrate that our network achieves superior performance at real-time speed (49 FPS) compared to state-of-the-art methods. Our code is publicly available at: https://***/rmcong/ESNet_ICML24. Copyright 2024 by the author(s)
Polyps, like a silent time bomb in the gut, are always lurking and can explode into deadly colorectal cancer at any time. Many methods are attempted to maximize the early detection of colon polyps by screening, howeve...
详细信息
Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation *** is difficult for attackers to ...
详细信息
Attackers inject the designed adversarial sample into the target recommendation system to achieve illegal goals,seriously affecting the security and reliability of the recommendation *** is difficult for attackers to obtain detailed knowledge of the target model in actual scenarios,so using gradient optimization to generate adversarial samples in the local surrogate model has become an effective black‐box attack ***,these methods suffer from gradients falling into local minima,limiting the transferability of the adversarial *** reduces the attack's effectiveness and often ignores the imperceptibility of the generated adversarial *** address these challenges,we propose a novel attack algorithm called PGMRS‐KL that combines pre‐gradient‐guided momentum gradient optimization strategy and fake user generation constrained by Kullback‐Leibler ***,the algorithm combines the accumulated gradient direction with the previous step's gradient direction to iteratively update the adversarial *** uses KL loss to minimize the distribution distance between fake and real user data,achieving high transferability and imperceptibility of the adversarial *** results demonstrate the superiority of our approach over state‐of‐the‐art gradient‐based attack algorithms in terms of attack transferability and the generation of imperceptible fake user data.
This paper introduces a new few-shot learning pipeline that casts relevance ranking for image retrieval as binary ranking relation classification. In comparison to image classification, ranking relation classification...
详细信息
CNNs (Convolutional Neural Networks) have a good performance on most classification tasks, but they are vulnerable when meeting adversarial examples. Research and design of highly aggressive adversarial examples can h...
CNNs (Convolutional Neural Networks) have a good performance on most classification tasks, but they are vulnerable when meeting adversarial examples. Research and design of highly aggressive adversarial examples can help enhance the security and robustness of CNNs. The transferability of adversarial examples is still low in black-box settings. Therefore, an adversarial example method based on probability histogram equalization, namely HE-MI-FGSM (Histogram Equalization Momentum Iterative Fast Gradient Sign Method) is proposed. In each iteration of the adversarial example generation process, the original input image is randomly histogram equalized, and then the gradient is calculated to generate adversarial perturbations to mitigate overfitting in the adversarial example. The effectiveness of the method is verified on the ImageNet dataset. Compared with the advanced method I-FGSM (Iterative Fast Gradient Sign Method) and MI-FGSM (Momentum I-FGSM), the attack success rate in the adversarial training network increased by 27.9% and 7.7% on average, respectively.
Dear editor,Polar codes invented by Ar?kan [1] can achieve the capacity of symmetric binary-input discrete memoryless channels(B-DMCs) with an infinite code length. However, it suffers from unsatisfactory performance ...
Dear editor,Polar codes invented by Ar?kan [1] can achieve the capacity of symmetric binary-input discrete memoryless channels(B-DMCs) with an infinite code length. However, it suffers from unsatisfactory performance with a finite code length [2]. The performance degradation of polar codes with a finite code length is caused by the inadequate polarization phenomenon;
A sequent is a pair(Г,△),which is true under an as-signment if either some formula inГis false,or some formula in △ is *** L3-valued propositional logic,a mulisequent is a triple △|Θ|Г,which is true under an as...
详细信息
A sequent is a pair(Г,△),which is true under an as-signment if either some formula inГis false,or some formula in △ is *** L3-valued propositional logic,a mulisequent is a triple △|Θ|Г,which is true under an assignment if either some formula in △ has truth-value t,or some formula in Θ has truth-value m,or some formula in Г has truth-value£.Corre-spondingly there is a sound and complete Gentzen deduction system G for multisequents which is ***,a CO-multisequent is a triple △:Θ:Г,which is valid if there is an assignment v in which each formula in△has truth-value≠t,each formula in Θ has truth-value≠m,and each formula in Г has truth-value≠£.Correspondingly there is a sound and com-plete Gentzen deduction system G-for co-multisequents which is nonmonotonic.
A U-shaped-like parasitic strip loading antenna is proposed and designed, which can work in L1 band of GPS with circular polarization (CP) characteristics. The antenna consists of ground plane, dielectric, radiation p...
详细信息
Given a bipartite graph G = (T∪ B, E), the problem bipartite 1-sided vertex explosion is to decide whether there exists a planar 2-layer embedding of G after exploding at most k vertices of B. For this problem, which...
详细信息
The issue of data center power consumption is becoming increasingly serious. One of the most effective techniques for increasing resource utilization and lowering power consumption is virtual machine consolidation. Th...
详细信息
暂无评论